[1] |
SHOKRI R , SHMATIKOV V . Privacy-preserving deep learning[C]// The 53rd IEEE Annual Allerton Conference on Communication,Control,and Computing. 2015: 909-910.
|
[2] |
ZHU T , LI G , ZHOU W ,et al. Differentially private data publishing and analysis:a survey[J]. IEEE Transactions on Knowledge & Data Engineering, 2017,29(8): 1619-1638.
|
[3] |
MOHASSEL P , ZHANG Y . SecureML:a system for scalable privacy-preserving machine learning[C]// The 38th IEEE Symposium on Security and Privacy. 2017: 19-38.
|
[4] |
SWEENEY L . K-Anonymity:a model for protecting privacy[J]. International Journal of UncertainTy Fuzziness and Knowledge Based Systems, 2002,10(5): 557-570.
|
[5] |
MACHANAVAJJHALA A , GEHRKE J , KIFER D ,et al. l-diversity:privacy beyond k-anonymity[C]// The 22nd IEEE International Conference on Data Engineering.Atlanta Georgia. 2006: 24-24.
|
[6] |
LI N , LI T , VENKATASUBRAMANIAN S ,et al. T-closeness:privacy beyond k-anonymity and l-diversity[C]// The 23rd IEEE International Conference on Data Engineering. 2007: 106-115.
|
[7] |
DWORK C . Differential privacy[M]// Encyclopedia of Cryptography and Security. Springer, 2011: 338-340.
|
[8] |
ABADI M , CHU A , GOODFELLOW I ,et al. Deep learning with differential privacy[C]// The ACM SIGSAC Conference on Computer and Communications Security. 2016: 308-318.
|
[9] |
PAPERNOT N , ABADI M , ERLINGSSON U ,et al. Semi-supervised knowledge transfer for deep learning from private training data[C]// The 5th International Conference on Learning Representations. 2017
|
[10] |
ACS G , MELIS L , CASTELLUCCIA C ,et al. Differentially private mixture of generative neural networks[C]// The 17th IEEE International Conference on Data Mining. 2017: 715-720.
|
[11] |
BEAULIEU-JONES B K , WU Z S , WILLIAMS C ,et al. Privacy-preserving generative deep neural networks support clinical data sharing[R]. 2017.
|
[12] |
ZHANG X , JI S , WANG T ,et al. Differentially private releasing via Deep Generative Model[EB/OL]. . 2018.
|
[13] |
DWORK C , . Differential privacy:a survey of results[C]// International Conference on Theory and Applications of Models of Computation.Springer,Berlin,Heidelberg. 2008: 1-19.
|
[14] |
DWORK C , ROTH A . The algorithmic foundations of differential privacy[J]. Foundations and Trends in Theoretical Computer Science, 2014,9(3/4): 211-407.
|
[15] |
GOODFELLOW I , POUGET-ABADIE J , MIRZA M ,et al. Generative adversarial nets[C]// Advances in Neural Information Processing Systems. 2014: 2672-2680.
|
[16] |
ODENA A , OLAH C , SHLENS J . Conditional image synthesis with auxiliary classifier GANs[C]// International Conference on Machine Learning. 2017: 2642-2651.
|
[17] |
KAIROUZ P , OH S , VISWANATH P ,et al. The composition theorem for differential privacy[J]. IEEE Transactions on Information Theory, 2013,63(6): 4037-4049.
|
[18] |
SALIMANS T , GOODFELLOW I , ZAREMBA W ,et al. Improved techniques for training GANs[C]// Advances in Neural Information Processing Systems. 2016: 2234-2242.
|